US20090019182A1 - Behavioral predictions based on network activity locations - Google Patents
Behavioral predictions based on network activity locations Download PDFInfo
- Publication number
- US20090019182A1 US20090019182A1 US11/776,488 US77648807A US2009019182A1 US 20090019182 A1 US20090019182 A1 US 20090019182A1 US 77648807 A US77648807 A US 77648807A US 2009019182 A1 US2009019182 A1 US 2009019182A1
- Authority
- US
- United States
- Prior art keywords
- geographical location
- profile
- network
- activity source
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Definitions
- the present invention relates to systems and methods for predicting future behaviors based on past network activities. More specifically, the present invention relates to systems and methods for constructing time-based behavior pattern profiles with respect to one or more geographical locations based on past network activities and predicting future behavior patterns based on the profiles.
- the Internet has brought new opportunities to businesses around the world. Most importantly, geographical locations are no longer a significant restriction or limitation when conducting business transactions. More and more consumers enjoy the convenience of purchasing services and/or merchandise on the Internet from companies both close and afar, and consequently have much greater selections of services and/or merchandise to choose from. Many purely Internet-based companies have grown over the years into successful international corporations. These companies provide various types of services and/or merchandise on the Internet. For example, Yahoo!® Inc., one of the well-known Internet services companies, provides a full range of products and services, such as search engine, electronic mail (e-mail), news, message, travel, etc., to millions of people around the world.
- Internet-based companies conduct their business via the Internet: services are provided over the Internet, merchandise is sold over the Internet, information is exchanged over the Internet, etc. Often, these are done through the World Wide Web and/or emails. For example, people may access Yahoo!® search engine, Yahoo!® Mail, and other Yahoo!® services and/or products using a web browser, such as Windows Internet Explorer developed by Microsoft® Corp. or Firefox® developed by Mozilla® Corp. It is no longer relevant where a person is located in the physical world, for as long as the person has access to the Internet, the person has access to the services, merchandise, and information provided online by the companies.
- the companies are able to provide services and/or information tailored specifically to the needs of the customers based on where the customers are located, what the customers are doing, and other relevant factors at a particular time. For example, if a customer is shopping at a local grocery store, it may be desirable to send that customer information on products offered at that grocery store. In addition, it may also be desirable if the companies are able to anticipate the future needs of the customers and provide the appropriate information and/or services to the customers based on the expected future needs at the appropriate times. For example, if a customer generally takes a vacation every year during the summer months, it may be desirable to provide that customer with tourism information, such as possible vacation destinations or vacation package offers, shortly before each summer season.
- tourism information such as possible vacation destinations or vacation package offers
- the present invention relates to systems and methods for predicting future behaviors based on past network activities.
- a computer-implemented method for constructing network activity profiles comprises the following: obtaining a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determining a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and constructing at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
- a computer-implemented method for predicting future behaviors which comprises the following: constructing at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predicting future behaviors of the activity source based on the at least one profile.
- a computer program product for constructing network activity profiles comprising a computer-readable medium having a plurality of computer program instructions stored therein.
- the plurality of computer program instructures are operable to cause at least one computing device to: obtain a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determine a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and construct at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
- a computer program product predicting future behaviors comprising a computer-readable medium having a plurality of computer program instructions stored therein, which are operable to cause at least one computing device to: construct at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predict future behaviors of the activity source based on the at least one profile.
- FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles.
- FIG. 2 is a diagram that illustrates relationships between network activity profiles and network activity records.
- FIGS. 3A and 3B are two graphical illustrations of sample daily profiles.
- FIG. 4 is a graphical illustration of a sample weekly profile.
- FIG. 5 is a graphical illustration of a sample monthly profile.
- FIG. 6 is a graphical illustration of a sample yearly profile.
- FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented.
- the Internet may be accessed from different geographical locations around the world using various methods. Sometimes, certain methods may be more suitable for accessing particular types of information available on the Internet, while other times one method may be used for accessing different types of information.
- different types of electronic devices may be used to access the Internet. For example, web pages may be viewed using a web browser. Emails may be retrieved and/or sent using a web browser or an email application program. Files may be uploaded and/or downloaded using a web browser or an application program implementing the File Transfer Protocol (FTP).
- FTP File Transfer Protocol
- the various types of software programs for accessing the Internet may be executed on a computer or wireless devices such as a personal digital assistant (PDA) or a mobile telephone.
- PDA personal digital assistant
- the computer may be a desktop computer or a notebook computer.
- the computer may be connected to the Internet via a cable, such as an Ethernet cable or a telephone cable, or wirelessly through various types of networks.
- the PDA or the mobile telephone usually connect to the Internet wirelessly but may also be through various types of networks, such as a mobile telephone network.
- a record may be made of the network activities conducted by the person.
- the record may include various pieces of information describing the person's network activities. For example, a unique identification (ID) may indicate the source of the network activities; a network endpoint address, such as an Internet Protocol (IP) address, may indicate from where the Internet interaction originates; and an indication of time, such as a timestamp, may indicate when the network activities are conducted. Other relevant information may also be included in the record.
- ID unique identification
- IP Internet Protocol
- a unique cookie may be assigned to each web browser, and if the person uses a web browser to access the Internet (e.g., viewing web pages), a browser-unique cookie may be used identify the web browser, which is one type of Internet interaction source.
- people may establish online accounts (i.e., user accounts) at various websites, and a unique cookie may be assigned to each user account. If the person logs into his or her online account at a particular website, the user account-unique cookie may be used to identify the person conducting the network activities.
- profiles may be constructed for the activity sources based on their respective network activity records.
- Each profile may describe a time-based behavior pattern for a particular activity source.
- these profiles may be used to predict future behaviors for the activity sources.
- FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles.
- multiple network activity records associated with an activity source may be determined.
- the records may cover a period of time.
- each network activity record may include an activity source-unique ID, a network endpoint address, and a time indication.
- Raw data describing a person's interaction with the Internet may be collected and stored for a particular period of time. These data may include unique IDs identifying the source of the Internet interactions (e.g., browser-unique cookies or user account-unique cookies), network endpoint addresses from where the Internet interactions originate (e.g., IP addresses), time indications indicating when the Internet interactions occur (e.g., timestamps), and other relevant information.
- unique IDs identifying the source of the Internet interactions (e.g., browser-unique cookies or user account-unique cookies), network endpoint addresses from where the Internet interactions originate (e.g., IP addresses), time indications indicating when the Internet interactions occur (e.g., timestamps), and other relevant information.
- IP addresses e.g., IP addresses
- time indications indicating when the Internet interactions occur e.g., timestamps
- a particular website may implement software programs of specific functionalities for collecting and storing the data whenever people access that website.
- the collected raw data may need to be processed first (e.g., filtered, categorized, correlated, aggregated, etc.) to obtain the network activity records. For example, each set of IP address and timestamp is associated with the appropriate activity source ID. Duplicate pieces of data and/or irrelevant data are filtered out and discarded or ignored. Again, appropriate functionalities may be implemented using software programs.
- processing the raw data multiple network activity records may be obtained, and each record may include an activity source ID, an IP address, and a timestamp.
- Table 1 includes several sample representations of the network activity records for a particular activity source.
- each row represents a sample network activity record consisting of an activity source ID, an IP address, and a timestamp.
- the activity source ID shown in Table 1 may be a web browser-unique cookie or a user account-unique cookie. If the activity source ID is a web browser-unique cookie, it indicates a particular web browser has been used to access the Internet. Since generally a particular web browser is executed on the same electronic device (e.g., computer or PDA), this implies that the same electronic device has been used to interact with the Internet. However, different people may share that particular device and use the same web browser to access the Internet at different times. Thus, in this case, the records may represent network activities conducted by multiple people.
- the activity source ID is a user account-unique cookie, it generally implies that the same person has conducted the network activities represented by the records, since normally only the owner of a user account has the password to that account and may be able to log into the account. However, it is possible, although unlikely, that multiple people may share the same user account or another person may log into the owner's user account without the owner's permission. In this case, it is still possible that the records may represent network activities conducted by multiple people.
- the sample records shown in Table 1 describe Internet activities conducted over a period of approximately three months.
- the timestamps from the records indicate when the network activities occur.
- different formats may be used to represent the timestamp variable, and the format shown in Table 1 (i.e., year, month, day, hour, minute, and second) is merely an example. It is very likely that different implementations of the method may choose different formats to represent the timestamp variable.
- the IP addresses from the records indicate from where the network activities originate. In other words, the IP addresses, which may be either static or dynamic, are the IP addresses assigned to the electronic devices (e.g., router, computer, etc.) used for accessing the Internet.
- IP address belonging to that record is determined using the IP address belonging to that record.
- Various methods for determining geographical locations of an IP address are known. For example, various versions of software programs are designed to trace an IP addresses to their corresponding geographical locations. Lookup tables mapping IP addresses to physical locations are often stored on various network servers, particularly servers maintained by Internet Service Providers (ISP), which may be used to look up geographical locations for a given IP address.
- ISP Internet Service Providers
- Different levels of precision (i.e., granularity) of geographical locations may be determined for each IP address. For example, a particular IP address may be mapped to a country, a state or province, a county, a city, a street, a specific address, a direct marketing area (DMA), etc.
- DMA direct marketing area
- one or more geographical locations of different levels of granularity may be determined for each IP address from the network activity records. For example, a particular implementation of the method may choose to always determine the most granular locations possible for the IP addresses, while another implementation may choose to only determine the geographical locations corresponding to the IP addresses within a city. Yet another implementation may choose to determine geographical locations of different precisions for the IP addresses depending on various factors, such as the records available and the behavior profiles to be constructed.
- IP addresses it is also possible for multiple IP addresses to be mapped to the same geographical location, if they are physically located nearby. For example, one city may have multiple ISPs, each having a different IP address. If a person interacts with the Internet through more than one ISP located in the same city, the network activity records may show different IP addresses mapped to the same city.
- the determined geographical locations are associated with their corresponding IP addresses and may be stored along with the records.
- Table 1 three different IP addresses, 216.109.112.135, 209.73.168.74, and 124.83.139.192, are shown in the records. Two of the IP addresses, 216.109.112.135 and 209.73.168.74, are matched to the same city: United States, California, Sunnyvale, while the third IP address, 124.83.139.192, is located in Japan.
- Table 2 shows the records of Table 1 with corresponding geographical locations determined based on the IP addresses. In this example, the geographical locations for each IP address are determined to the most granular level. Thus, for the two IP addresses located in the United States, the corresponding geographical locations are matched to within the city, and for the IP address located in Japan, the corresponding geographical location is matched only to within the country.
- one or more profiles for the activity source may be constructed using the network activity records and the geographical locations corresponding to the IP addresses in the records.
- the profiles describe or represent time-based behavior patterns with respect to the different geographical locations and may include information such as the geographical locations and timestamps indicating the time for the network activities conducted at each of the geographical locations.
- the profiles may cover different time periods, such as network activities conducted within a day, a week, a month, a year, and any other desirable time periods. Generally, in order to construct a profile covering a specific time period, network activity records should be available covering that time period.
- one or more daily profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each different location during a day.
- one or more weekly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a week.
- one or more monthly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a month.
- one or more yearly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per month during a year. Examples of daily, weekly, monthly, and yearly profiles are explained in more detail below in FIGS. 3-6 respectively.
- future behaviors for the activity source may be predicted with respect to the geographical locations. For example, based on a daily profile representing network activities during a work day, future behaviors may be predicted for other work days. A similar concept applies to weekly, monthly, and yearly profiles.
- appropriate information may be provided to the activity source at the suitable geographical locations during the suitable time periods based on the predicted or expected future behaviors. The appropriateness of the information may depend on the types of predicted future behaviors considered.
- examples of 180 and 190 will be explained in more detail below in FIGS. 3-6 with respect to the daily, weekly, monthly, and yearly profiles.
- FIG. 2 is a diagram that illustrates relationships between the network activity records and profiles. To simplify the discussion, only five network activity records 200 are shown in FIG. 2 . In practice, it is more likely that hundreds, even thousands of network activity records for a single activity source may be used to construct the profiles for that activity source.
- Each network activity record 200 includes at least an indication, such as a unique ID, identifying the activity source, an IP address from where the activity originates, and a timestamp indicating the time of the activity. Of course, other information may also exist in the records.
- One or more geographical locations 210 are determined for each IP address and associated with the corresponding record 200 .
- one or more types of profiles i.e., daily profile 220 , weekly profile 221 , monthly profile 222 , and/or yearly profile 223 ) may be constructed based on the records 200 and the corresponding geographical locations 210 .
- the same type of profiles 220 , 221 , 222 , 223 may be constructed multiple times, each for a different time period.
- two daily profiles 220 may be constructed, one representing a weekday and one representing a weekend day.
- twelve monthly profiles 222 may be constructed, each representing a different month of the year.
- Information from one or more records may be used to construct the profiles. In other words, information from all the available records is not necessarily always used to generate each profile. Sometimes, for a particular profile, such as a daily profile, only a few records are used. Other times, more records are used, such as for constructing a monthly or yearly profile.
- FIGS. 3A and 3B are two graphical illustrations of sample daily profiles.
- FIG. 3A shows a sample weekday profile
- FIG. 3B shows a sample weekend day profile. Since people are unlikely to be interacting with the Internet all day long, the daily profiles would only show those time periods when the activity source is actually accessing the Internet.
- FIG. 3A there are five distinct time periods during which the activity source is accessing the Internet: from 07:00 to 07:30, from 08:00 to 12:00, from 13:00 to 18:00, from 19:00 to 19:30, and finally from 21:00 to 22:00.
- the activities originate from geographical location 300 .
- the activity source ID is a user account-unique cookie, which generally implies that the network activity records represent a person logging into his or her user account, and since this is a profile for a weekday, the pattern of the network activities may indicate that geographical location 300 may be the person's home, geographical location 301 may be the person's office, and geographical location 302 may be a place where the person goes to after work, such as a restaurant, a coffee shop, a theatre, or a club. Based on the time periods during which there are network activities at each of the distinct geographical locations 300 , 301 , 302 , a percentage distribution of the amount of time during which there are network activities originated from each location during the weekday may be calculated.
- a time-based behavior pattern may be determined with respect to the distinct geographical locations.
- a geographical location may be associated with each period of time when there are network activities.
- the behavior pattern may indicate that the person leaves home for work around 07:30, spends the majority of the day (i.e., from approximately 8:00 to approximate 18:00) at the office, spends some time out during the evening, and arrives home no later than 21:00.
- future behaviors for activity source during a weekday may be predicted. For example, a person is likely to spend approximately the same period of time at work during each weekday. Similarly, the person is likely to leave home for work and return home at approximately the same time each weekday. It is also possible that the person may frequent a few favorite establishments from time to time (e.g., having dinners at a favorite restaurant or buying grocery from the local grocery store).
- Appropriate information corresponding to the person's daily activities may be provided to the person conducting the network activities based on the predicted or expected future behaviors. For example, assuming geographical location 302 is a night club, information may be provided to the person earlier in the afternoon or shortly before the person leaves work about the events that will likely take place at the night club (i.e., geographical location 302 ) later that evening. Or, if geographical location 302 is a grocery store, information about the special offers at the store may be sent to the person either shortly before the person is likely or expected to go to the store or while the person is likely at the store. If the locations of the person's home and office are known, the route the person takes to and from work may be determined. During early morning and late afternoon on weekdays, traffic information about the route may be provided. Other information relating to daily activities may include weather, news, etc.
- information may be sent via email, instant message, voice message, etc.
- FIG. 3B there are three distinct time periods during which the activity source is accessing the Internet: from 08:00 to 11:30, from 15:30 to 16:00, and from 19:00 to 20:00. Again, based on the geographical locations determined using the IP addresses in the network activity records, there are two distinct geographical locations from where the network activities originate. From 08:00 to 11:30 and 19:00 to 20:00, the activities originate from geographical location 300 . From 15:30 to 16:00, the activities originate from geographical location 303 .
- the time-based behavior pattern determined from the profile shown in FIG. 3B may indicate that on a weekend day, the person spends the morning at home, goes out in the afternoon, and spends at least some time during the evening again at home.
- a person may not access the Internet for long periods of time. The person may only quickly check his or her emails from time to time.
- there are network activities originated from geographical location 303 for approximately half an hour (from 15:30 to 16:00) the person may actually be at geographical location 303 for a much longer time period.
- a person's behavior may not be as regular on the weekends as during the week. Nevertheless, it is still possible to predict the person's future behavior pattern, especially if multiple weekend day profiles are used. For example, several weekend day profiles may be constructed, each representing a different weekend day, and future weekend day behaviors may be predicted based on multiple weekend day profiles, perhaps by aggregating or averaging the information from these multiple profiles in order to obtain a more precise behavior pattern.
- the daily profiles show time-based behavior pattern for an activity source during a single day.
- a weekly profile shows time-based behavior pattern for an activity source for each day of the week during an entire week.
- FIG. 4 is a graphical illustration of a sample weekly profile. Time-based distributions for the network activities originated from each of the distinct geographical locations are described for each day of the week. From the sample weekly profile shown in FIG. 4 , there appears to be more network activities during the week than on the weekend, perhaps due to the fact that the person often spends time on other activities on the weekends.
- the person spends a majority of time at work (i.e., geographical location 301 ). The person may occasionally go out on weekday evenings. However, on the weekends, the person may visit places for leisure or entertainment more frequently (e.g., geographical locations 302 and 303 ). Again, future behavior patterns describing the activity source's weekly activities may be predicted using one or more weekly profiles, and information about the person's weekly activities, such as leisure time activities, may be provided to the person based on the predicted or expected future activities.
- information about places that the person likes to visit on the weekends may be provided to the person, perhaps on each Friday. If the person frequently goes to a movie theatre on the weekends, information about movies that will be played at the theatre during the upcoming weekend may be sent to the person some time during the week. If the person likes to shop at a mall on the weekends, information about special offers or advertisement from the stores at the mall may be sent to the person at the appropriate time (e.g., either shortly before or while the person is shopping).
- more than one weekly profile may be constructed for an activity source. These multiple weekly profiles may represent different weeks of a month, or weeks of multiple months.
- FIG. 5 is a graphical illustration of a sample monthly profile.
- time distributions for network activities originated from each distinct geographical location are described for each day of the month for an entire month, which in turn shows the behavior pattern of the network activity source during the month.
- the profile indicates that the activity source repeats approximately the same behavior pattern: spending most of the weekdays at the office (geographical location 301 ), occasionally having some leisure time by visiting various establishments on weekday evenings or weekends (geographical locations 302 and 303 ), and spending other times at home (geographical location 300 ).
- the profile indicates that the activity source is at a new geographical location 304 .
- This may imply or indicate that the activity source travels to another site, such as a different office location of the company or a customer site, for business on the third week of the week.
- geographical location 304 may be the office of the business site the activity source visits, since the activity source is there during normal business hours.
- Geographical location 305 may be a hotel where the activity source stays during the week, and geographical location 306 may be an airport.
- One or more monthly profiles may be used to predict the activity source's future behavior pattern on a monthly basis.
- the activity source may visit the alternative office site (geographical location 304 ) to take other business trips periodically, such as once a month or once every few months.
- Information relating to monthly activities shown in the monthly profile may be provided to the activity source. For example, if based on the monthly profile, it may be predicted that the activity source will take a business trip soon, travel information, such as flights, hotels, restaurants, etc. may be sent to the activity source some time before the scheduled time for the trip.
- more than one monthly profile may be constructed for an activity source. These multiple monthly profiles may represent different months of a year, or months of different years.
- FIG. 6 is a graphical illustration of a sample yearly profile. Time distributions for network activities originated from each distinct geographical location are described for each month of the year for an entire year, which in turn shows the behavior pattern of the network activity source during the year.
- the activity source normally spends most of the time between home (geographical location 300 ) and office (geographical location 301 ). Once every three months, the activity source generally visits an alternative office site (geographical location 304 ) for a week and stays at a hotel (geographical location 305 ) during the visit.
- the activity source visits another new geographical location 307 . It may be determined that geographical location 307 is a place the activity source visits during vacation time, such as a beach resort or a city in a different country. Similarly, during the last week of December, the activity source also visits a new geographical location 308 , which may be a ski resort or a home of a friend of family whom the activity source visits during the holiday season.
- the yearly profile may be used to predict future behaviors for the activity source on a yearly basis.
- Information relating to the activity source's yearly activities may be provided to the activity source at appropriate times. For example, when it gets close to the time when the activity source is expected to take a vacation, tourism related information, such as resorts, possible destinations, flights, hotels, services, etc. may be provided to the activity source. When it gets close to the holiday seasons, information on merchandise as possible gift ideas as well as travel information may be provided to the activity source.
- multiple yearly profiles may be constructed for an activity source.
- FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented.
- the various aspects of the invention may be practiced in a wide variety of network environments (represented by network 217 ) including, for example, TCP/IP-based networks, telecommunications networks, wireless networks, etc.
- the computer program instructions with which embodiments of the invention are implemented may be stored in any type of computer-readable media, and may be executed according to a variety of computing models including, for example, on a stand-alone computing device, or according to a distributed computing model in which various of the functionalities described herein may be effected or employed at different locations.
- the software program implementing various embodiments may be executed on the server 208 .
- websites may be hosted on various servers 708 .
- Software programs designed to collect network activity information e.g., activity source ID, IP address, timestamp
- the collected information may be stored in one or more databases 714 communicatively linked to the servers 708
- interaction with the Internet 712 may be conducted using various devices, such as desktop computers 703 , notebook computers 702 , mobile telephones 704 , PDAs 705 , etc.
- the devices may be connected to the Internet via cables and perhaps through a router 709 or wirelessly.
- a web browser may be executed on the devices and used to view the web page, each web browser having a unique ID that may be used to identify the web browser (i.e., activity source).
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- 1. Field of the Invention
- The present invention relates to systems and methods for predicting future behaviors based on past network activities. More specifically, the present invention relates to systems and methods for constructing time-based behavior pattern profiles with respect to one or more geographical locations based on past network activities and predicting future behavior patterns based on the profiles.
- 2. Background of the Invention
- The Internet has brought new opportunities to businesses around the world. Most importantly, geographical locations are no longer a significant restriction or limitation when conducting business transactions. More and more consumers enjoy the convenience of purchasing services and/or merchandise on the Internet from companies both close and afar, and consequently have much greater selections of services and/or merchandise to choose from. Many purely Internet-based companies have grown over the years into successful international corporations. These companies provide various types of services and/or merchandise on the Internet. For example, Yahoo!® Inc., one of the well-known Internet services companies, provides a full range of products and services, such as search engine, electronic mail (e-mail), news, message, travel, etc., to millions of people around the world.
- Naturally, Internet-based companies conduct their business via the Internet: services are provided over the Internet, merchandise is sold over the Internet, information is exchanged over the Internet, etc. Often, these are done through the World Wide Web and/or emails. For example, people may access Yahoo!® search engine, Yahoo!® Mail, and other Yahoo!® services and/or products using a web browser, such as Windows Internet Explorer developed by Microsoft® Corp. or Firefox® developed by Mozilla® Corp. It is no longer relevant where a person is located in the physical world, for as long as the person has access to the Internet, the person has access to the services, merchandise, and information provided online by the companies.
- On the other hand, the types of services and/or information a person desires or needs often depends the person's physical location at a given time. For example, when a person is working, he or she may search for work-related information on the Internet. When a person is shopping, he or she may desire information on discounts or special deals offered by the stores nearby. When a person is traveling, he or she may need information on the destination, such as maps, tourist attractions, hotels, restaurants, transportations, etc.
- In order to better serve their customers, it may be desirable if the companies are able to provide services and/or information tailored specifically to the needs of the customers based on where the customers are located, what the customers are doing, and other relevant factors at a particular time. For example, if a customer is shopping at a local grocery store, it may be desirable to send that customer information on products offered at that grocery store. In addition, it may also be desirable if the companies are able to anticipate the future needs of the customers and provide the appropriate information and/or services to the customers based on the expected future needs at the appropriate times. For example, if a customer generally takes a vacation every year during the summer months, it may be desirable to provide that customer with tourism information, such as possible vacation destinations or vacation package offers, shortly before each summer season.
- Accordingly, what are needed are systems and methods to address the above-identified issues.
- Broadly speaking, the present invention relates to systems and methods for predicting future behaviors based on past network activities.
- In one embodiment, a computer-implemented method for constructing network activity profiles is provided, which comprises the following: obtaining a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determining a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and constructing at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
- In another embodiment, a computer-implemented method for predicting future behaviors, which comprises the following: constructing at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predicting future behaviors of the activity source based on the at least one profile.
- In another embodiment, a computer program product for constructing network activity profiles comprising a computer-readable medium having a plurality of computer program instructions stored therein is provided. The plurality of computer program instructures are operable to cause at least one computing device to: obtain a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determine a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and construct at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
- In another embodiment, a computer program product predicting future behaviors comprising a computer-readable medium having a plurality of computer program instructions stored therein, which are operable to cause at least one computing device to: construct at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predict future behaviors of the activity source based on the at least one profile.
- These and other features, aspects, and advantages of the invention will be described in more detail below in the detailed description and in conjunction with the following figures.
- The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
-
FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles. -
FIG. 2 is a diagram that illustrates relationships between network activity profiles and network activity records. -
FIGS. 3A and 3B are two graphical illustrations of sample daily profiles. -
FIG. 4 is a graphical illustration of a sample weekly profile. -
FIG. 5 is a graphical illustration of a sample monthly profile. -
FIG. 6 is a graphical illustration of a sample yearly profile. -
FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented. - The present invention will now be described in detail with reference to a few preferred embodiments thereof as illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without some or all of these specific details. In other instances, well known process steps and/or structures have not been described in detail in order to not unnecessarily obscure the present invention. In addition, while the invention will be described in conjunction with the particular embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. To the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims.
- The Internet may be accessed from different geographical locations around the world using various methods. Sometimes, certain methods may be more suitable for accessing particular types of information available on the Internet, while other times one method may be used for accessing different types of information. Similarly, different types of electronic devices may be used to access the Internet. For example, web pages may be viewed using a web browser. Emails may be retrieved and/or sent using a web browser or an email application program. Files may be uploaded and/or downloaded using a web browser or an application program implementing the File Transfer Protocol (FTP). The various types of software programs for accessing the Internet may be executed on a computer or wireless devices such as a personal digital assistant (PDA) or a mobile telephone. The computer may be a desktop computer or a notebook computer. The computer may be connected to the Internet via a cable, such as an Ethernet cable or a telephone cable, or wirelessly through various types of networks. The PDA or the mobile telephone usually connect to the Internet wirelessly but may also be through various types of networks, such as a mobile telephone network.
- Each time a person interacts with or accesses the Internet, a record may be made of the network activities conducted by the person. The record may include various pieces of information describing the person's network activities. For example, a unique identification (ID) may indicate the source of the network activities; a network endpoint address, such as an Internet Protocol (IP) address, may indicate from where the Internet interaction originates; and an indication of time, such as a timestamp, may indicate when the network activities are conducted. Other relevant information may also be included in the record.
- There may be different types of Internet access or activities source, and examples may include the person interacting with the Internet, the web browser used by the person to access the Internet, etc. In one or more embodiments, a unique cookie may be assigned to each web browser, and if the person uses a web browser to access the Internet (e.g., viewing web pages), a browser-unique cookie may be used identify the web browser, which is one type of Internet interaction source. Similarly, people may establish online accounts (i.e., user accounts) at various websites, and a unique cookie may be assigned to each user account. If the person logs into his or her online account at a particular website, the user account-unique cookie may be used to identify the person conducting the network activities.
- Over time, records of Internet interactions or activities may be collected and stored, and profiles may be constructed for the activity sources based on their respective network activity records. Each profile may describe a time-based behavior pattern for a particular activity source. Furthermore, these profiles may be used to predict future behaviors for the activity sources.
-
FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles. At 110, from a collection of data, multiple network activity records associated with an activity source may be determined. The records may cover a period of time. And each network activity record may include an activity source-unique ID, a network endpoint address, and a time indication. - Raw data describing a person's interaction with the Internet may be collected and stored for a particular period of time. These data may include unique IDs identifying the source of the Internet interactions (e.g., browser-unique cookies or user account-unique cookies), network endpoint addresses from where the Internet interactions originate (e.g., IP addresses), time indications indicating when the Internet interactions occur (e.g., timestamps), and other relevant information. There are different methods for collecting such data. For example, a particular website may implement software programs of specific functionalities for collecting and storing the data whenever people access that website.
- The collected raw data may need to be processed first (e.g., filtered, categorized, correlated, aggregated, etc.) to obtain the network activity records. For example, each set of IP address and timestamp is associated with the appropriate activity source ID. Duplicate pieces of data and/or irrelevant data are filtered out and discarded or ignored. Again, appropriate functionalities may be implemented using software programs. By processing the raw data, multiple network activity records may be obtained, and each record may include an activity source ID, an IP address, and a timestamp. The following table, Table 1, includes several sample representations of the network activity records for a particular activity source.
-
TABLE 1 Sample Network Activity Records Activity Source ID IP Address Timestamp 61867037 216.109.112.135 2007-01-05 10:43:20 61867037 216.109.112.135 2007-01-12 18:51:12 61867037 209.73.168.74 2007-01-31 16:15:25 61867037 124.83.139.192 2007-02-10 23:54:14 61867037 124.83.139.192 2007-02-17 12:42:21 61867037 216.109.112.135 2007-02-21 09:04:14 61867037 209.73.168.74 2007-03-03 09:52:31 61867037 216.109.112.135 2007-03-17 14:20:30 61867037 124.83.139.192 2007-03-28 08:35:40 - In Table 1, each row represents a sample network activity record consisting of an activity source ID, an IP address, and a timestamp. The activity source ID shown in Table 1 may be a web browser-unique cookie or a user account-unique cookie. If the activity source ID is a web browser-unique cookie, it indicates a particular web browser has been used to access the Internet. Since generally a particular web browser is executed on the same electronic device (e.g., computer or PDA), this implies that the same electronic device has been used to interact with the Internet. However, different people may share that particular device and use the same web browser to access the Internet at different times. Thus, in this case, the records may represent network activities conducted by multiple people.
- On the other hand, if the activity source ID is a user account-unique cookie, it generally implies that the same person has conducted the network activities represented by the records, since normally only the owner of a user account has the password to that account and may be able to log into the account. However, it is possible, although unlikely, that multiple people may share the same user account or another person may log into the owner's user account without the owner's permission. In this case, it is still possible that the records may represent network activities conducted by multiple people.
- The sample records shown in Table 1 describe Internet activities conducted over a period of approximately three months. The timestamps from the records indicate when the network activities occur. Of course different formats may be used to represent the timestamp variable, and the format shown in Table 1 (i.e., year, month, day, hour, minute, and second) is merely an example. It is very likely that different implementations of the method may choose different formats to represent the timestamp variable. In addition, the IP addresses from the records indicate from where the network activities originate. In other words, the IP addresses, which may be either static or dynamic, are the IP addresses assigned to the electronic devices (e.g., router, computer, etc.) used for accessing the Internet.
- Once records that cover a period of time are obtained for a particular activity source, at 120, for each record, one or more geographical locations are determined using the IP address belonging to that record. Various methods for determining geographical locations of an IP address are known. For example, various versions of software programs are designed to trace an IP addresses to their corresponding geographical locations. Lookup tables mapping IP addresses to physical locations are often stored on various network servers, particularly servers maintained by Internet Service Providers (ISP), which may be used to look up geographical locations for a given IP address.
- Additional examples of systems and methods for associating one or more geographical locations with an IP address are disclosed in U.S. patent application Ser. No. 11/729,365 (Attorney Docket No. Y01949US00) and U.S. patent application Ser. No. 11/729,364 (Attorney Docket No. Y01951US00), both titled “System and Method for Associating a Geographical Location with an Internet Protocol Address,” which are incorporated by reference to the extent not inconsistent with the claimed aspects and the disclosure herein.
- Different levels of precision (i.e., granularity) of geographical locations may be determined for each IP address. For example, a particular IP address may be mapped to a country, a state or province, a county, a city, a street, a specific address, a direct marketing area (DMA), etc. Depending on the requirements or preferences of the specific implementations of the method, one or more geographical locations of different levels of granularity may be determined for each IP address from the network activity records. For example, a particular implementation of the method may choose to always determine the most granular locations possible for the IP addresses, while another implementation may choose to only determine the geographical locations corresponding to the IP addresses within a city. Yet another implementation may choose to determine geographical locations of different precisions for the IP addresses depending on various factors, such as the records available and the behavior profiles to be constructed.
- Sometimes, it is also possible for multiple IP addresses to be mapped to the same geographical location, if they are physically located nearby. For example, one city may have multiple ISPs, each having a different IP address. If a person interacts with the Internet through more than one ISP located in the same city, the network activity records may show different IP addresses mapped to the same city.
- The determined geographical locations are associated with their corresponding IP addresses and may be stored along with the records. In Table 1, three different IP addresses, 216.109.112.135, 209.73.168.74, and 124.83.139.192, are shown in the records. Two of the IP addresses, 216.109.112.135 and 209.73.168.74, are matched to the same city: United States, California, Sunnyvale, while the third IP address, 124.83.139.192, is located in Japan. The following table, Table 2, shows the records of Table 1 with corresponding geographical locations determined based on the IP addresses. In this example, the geographical locations for each IP address are determined to the most granular level. Thus, for the two IP addresses located in the United States, the corresponding geographical locations are matched to within the city, and for the IP address located in Japan, the corresponding geographical location is matched only to within the country.
-
TABLE 2 Sample Network Activity Records with Geographical Locations Activity Geographical Source ID IP Address Timestamp Locations 61867037 216.109.112.135 2007-01-05 10:43:20 United States; California; Sunnyvale 61867037 216.109.112.135 2007-01-12 18:51:12 United States; California; Sunnyvale 61867037 209.73.168.74 2007-01-31 16:15:25 United States; California; Sunnyvale 61867037 124.83.139.192 2007-02-10 23:54:14 Japan 61867037 124.83.139.192 2007-02-17 12:42:21 Japan 61867037 216.109.112.135 2007-02-21 09:04:14 United States; California; Sunnyvale 61867037 209.73.168.74 2007-03-03 09:52:31 United States; California; Sunnyvale 61867037 216.109.112.135 2007-03-17 14:20:30 United States; California; Sunnyvale 61867037 124.83.139.192 2007-03-28 08:35:40 Japan - Once the geographical locations corresponding to the IP addresses are determined, at 130, one or more profiles for the activity source may be constructed using the network activity records and the geographical locations corresponding to the IP addresses in the records. The profiles describe or represent time-based behavior patterns with respect to the different geographical locations and may include information such as the geographical locations and timestamps indicating the time for the network activities conducted at each of the geographical locations. The profiles may cover different time periods, such as network activities conducted within a day, a week, a month, a year, and any other desirable time periods. Generally, in order to construct a profile covering a specific time period, network activity records should be available covering that time period.
- For example, at 140, one or more daily profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each different location during a day. At 150, one or more weekly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a week. At 160, one or more monthly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a month. At 170, one or more yearly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per month during a year. Examples of daily, weekly, monthly, and yearly profiles are explained in more detail below in
FIGS. 3-6 respectively. - Based on various types of profiles, at 180, future behaviors for the activity source may be predicted with respect to the geographical locations. For example, based on a daily profile representing network activities during a work day, future behaviors may be predicted for other work days. A similar concept applies to weekly, monthly, and yearly profiles. At 190, appropriate information may be provided to the activity source at the suitable geographical locations during the suitable time periods based on the predicted or expected future behaviors. The appropriateness of the information may depend on the types of predicted future behaviors considered. Again, examples of 180 and 190 will be explained in more detail below in
FIGS. 3-6 with respect to the daily, weekly, monthly, and yearly profiles. - Different types of profiles (e.g., daily, weekly, monthly, and yearly) may be constructed based on a collection of network activity records covering the appropriate time periods.
FIG. 2 is a diagram that illustrates relationships between the network activity records and profiles. To simplify the discussion, only five network activity records 200 are shown inFIG. 2 . In practice, it is more likely that hundreds, even thousands of network activity records for a single activity source may be used to construct the profiles for that activity source. - Each
network activity record 200 includes at least an indication, such as a unique ID, identifying the activity source, an IP address from where the activity originates, and a timestamp indicating the time of the activity. Of course, other information may also exist in the records. One or moregeographical locations 210, perhaps at different levels of precision or granularity, are determined for each IP address and associated with thecorresponding record 200. And one or more types of profiles (i.e.,daily profile 220,weekly profile 221,monthly profile 222, and/or yearly profile 223) may be constructed based on therecords 200 and the correspondinggeographical locations 210. Depending on implementation requirements, for example, the same type ofprofiles daily profiles 220 may be constructed, one representing a weekday and one representing a weekend day. Similarly, twelvemonthly profiles 222 may be constructed, each representing a different month of the year. - Information from one or more records may be used to construct the profiles. In other words, information from all the available records is not necessarily always used to generate each profile. Sometimes, for a particular profile, such as a daily profile, only a few records are used. Other times, more records are used, such as for constructing a monthly or yearly profile.
-
FIGS. 3A and 3B are two graphical illustrations of sample daily profiles.FIG. 3A shows a sample weekday profile, andFIG. 3B shows a sample weekend day profile. Since people are unlikely to be interacting with the Internet all day long, the daily profiles would only show those time periods when the activity source is actually accessing the Internet. - In
FIG. 3A , there are five distinct time periods during which the activity source is accessing the Internet: from 07:00 to 07:30, from 08:00 to 12:00, from 13:00 to 18:00, from 19:00 to 19:30, and finally from 21:00 to 22:00. Based on the geographical locations determined using the IP addresses in the network activity records, there are three distinct geographical locations from where the network activities originate. From 07:00 to 07:30 and from 21:00 to 22:00, the activities originate fromgeographical location 300. From 08:00 to 12:00 and from 13:00 to 18:00, the activities originate fromgeographical location 301. And from 19:00 to 19:30, the activities originate fromgeographical location 302. - Assuming the activity source ID is a user account-unique cookie, which generally implies that the network activity records represent a person logging into his or her user account, and since this is a profile for a weekday, the pattern of the network activities may indicate that
geographical location 300 may be the person's home,geographical location 301 may be the person's office, andgeographical location 302 may be a place where the person goes to after work, such as a restaurant, a coffee shop, a theatre, or a club. Based on the time periods during which there are network activities at each of the distinctgeographical locations - Consequently, a time-based behavior pattern may be determined with respect to the distinct geographical locations. In other words, a geographical location may be associated with each period of time when there are network activities. For example, as shown in
FIG. 3A , the behavior pattern may indicate that the person leaves home for work around 07:30, spends the majority of the day (i.e., from approximately 8:00 to approximate 18:00) at the office, spends some time out during the evening, and arrives home no later than 21:00. - Of course, there are time periods during the day when there is no network activity from the person, and so no geographical locations are associated with those time periods. For example, early in the morning and late at night, there is no network activity and so no geographical locations are associated with those time periods, most likely because the person is asleep. Similarly, from 12:00 to 13:00 (i.e., the lunch hour) there is no corresponding geographical location, because there is no network activity from the person, perhaps because the person is having lunch.
- Based on the daily profile shown in
FIG. 3A , future behaviors for activity source during a weekday may be predicted. For example, a person is likely to spend approximately the same period of time at work during each weekday. Similarly, the person is likely to leave home for work and return home at approximately the same time each weekday. It is also possible that the person may frequent a few favorite establishments from time to time (e.g., having dinners at a favorite restaurant or buying grocery from the local grocery store). - Appropriate information corresponding to the person's daily activities may be provided to the person conducting the network activities based on the predicted or expected future behaviors. For example, assuming
geographical location 302 is a night club, information may be provided to the person earlier in the afternoon or shortly before the person leaves work about the events that will likely take place at the night club (i.e., geographical location 302) later that evening. Or, ifgeographical location 302 is a grocery store, information about the special offers at the store may be sent to the person either shortly before the person is likely or expected to go to the store or while the person is likely at the store. If the locations of the person's home and office are known, the route the person takes to and from work may be determined. During early morning and late afternoon on weekdays, traffic information about the route may be provided. Other information relating to daily activities may include weather, news, etc. - There are many ways to send information to a person via the Internet. For example, information may be sent via email, instant message, voice message, etc.
- In
FIG. 3B , there are three distinct time periods during which the activity source is accessing the Internet: from 08:00 to 11:30, from 15:30 to 16:00, and from 19:00 to 20:00. Again, based on the geographical locations determined using the IP addresses in the network activity records, there are two distinct geographical locations from where the network activities originate. From 08:00 to 11:30 and 19:00 to 20:00, the activities originate fromgeographical location 300. From 15:30 to 16:00, the activities originate fromgeographical location 303. - Consequently, the time-based behavior pattern determined from the profile shown in
FIG. 3B may indicate that on a weekend day, the person spends the morning at home, goes out in the afternoon, and spends at least some time during the evening again at home. In addition, while a person is having fun, he or she may not access the Internet for long periods of time. The person may only quickly check his or her emails from time to time. Thus, although inFIG. 3B , there are network activities originated fromgeographical location 303 for approximately half an hour (from 15:30 to 16:00), the person may actually be atgeographical location 303 for a much longer time period. - Often, a person's behavior may not be as regular on the weekends as during the week. Nevertheless, it is still possible to predict the person's future behavior pattern, especially if multiple weekend day profiles are used. For example, several weekend day profiles may be constructed, each representing a different weekend day, and future weekend day behaviors may be predicted based on multiple weekend day profiles, perhaps by aggregating or averaging the information from these multiple profiles in order to obtain a more precise behavior pattern.
- Thus, several weekend day profiles may together indicate that the person usually goes out in the afternoons on the weekends. Of course, the person may not always visit the same place on every weekend. On some days, the person may visit one place while on other days, the person visit another place. Based on the number of times the person visits each place, it may be determined that the person may visit some places more frequently than others. It may also be determined that the person may always visit a particular place on certain weekend days (e.g., every first Saturday of the month).
- The daily profiles show time-based behavior pattern for an activity source during a single day. A weekly profile, on the other hand, shows time-based behavior pattern for an activity source for each day of the week during an entire week.
FIG. 4 is a graphical illustration of a sample weekly profile. Time-based distributions for the network activities originated from each of the distinct geographical locations are described for each day of the week. From the sample weekly profile shown inFIG. 4 , there appears to be more network activities during the week than on the weekend, perhaps due to the fact that the person often spends time on other activities on the weekends. - During weekdays, the person spends a majority of time at work (i.e., geographical location 301). The person may occasionally go out on weekday evenings. However, on the weekends, the person may visit places for leisure or entertainment more frequently (e.g.,
geographical locations 302 and 303). Again, future behavior patterns describing the activity source's weekly activities may be predicted using one or more weekly profiles, and information about the person's weekly activities, such as leisure time activities, may be provided to the person based on the predicted or expected future activities. - For example, information about places that the person likes to visit on the weekends may be provided to the person, perhaps on each Friday. If the person frequently goes to a movie theatre on the weekends, information about movies that will be played at the theatre during the upcoming weekend may be sent to the person some time during the week. If the person likes to shop at a mall on the weekends, information about special offers or advertisement from the stores at the mall may be sent to the person at the appropriate time (e.g., either shortly before or while the person is shopping).
- Similar to daily profiles, more than one weekly profile may be constructed for an activity source. These multiple weekly profiles may represent different weeks of a month, or weeks of multiple months.
- To further extend the period of time covered in a profile,
FIG. 5 is a graphical illustration of a sample monthly profile. In this case, time distributions for network activities originated from each distinct geographical location are described for each day of the month for an entire month, which in turn shows the behavior pattern of the network activity source during the month. - In the sample profile shown in
FIG. 5 , during the first, second, and fourth week of the month, the profile indicates that the activity source repeats approximately the same behavior pattern: spending most of the weekdays at the office (geographical location 301), occasionally having some leisure time by visiting various establishments on weekday evenings or weekends (geographical locations 302 and 303), and spending other times at home (geographical location 300). - During the third week of month (from the 14th to the 20th), the profile indicates that the activity source is at a new
geographical location 304. This may imply or indicate that the activity source travels to another site, such as a different office location of the company or a customer site, for business on the third week of the week. Thus,geographical location 304 may be the office of the business site the activity source visits, since the activity source is there during normal business hours.Geographical location 305 may be a hotel where the activity source stays during the week, andgeographical location 306 may be an airport. - One or more monthly profiles, such as the one shown in
FIG. 5 , may be used to predict the activity source's future behavior pattern on a monthly basis. For example, the activity source may visit the alternative office site (geographical location 304) to take other business trips periodically, such as once a month or once every few months. Information relating to monthly activities shown in the monthly profile may be provided to the activity source. For example, if based on the monthly profile, it may be predicted that the activity source will take a business trip soon, travel information, such as flights, hotels, restaurants, etc. may be sent to the activity source some time before the scheduled time for the trip. - Similar to daily and weekly profiles, more than one monthly profile may be constructed for an activity source. These multiple monthly profiles may represent different months of a year, or months of different years.
-
FIG. 6 is a graphical illustration of a sample yearly profile. Time distributions for network activities originated from each distinct geographical location are described for each month of the year for an entire year, which in turn shows the behavior pattern of the network activity source during the year. In the sample profile shown inFIG. 6 , the activity source normally spends most of the time between home (geographical location 300) and office (geographical location 301). Once every three months, the activity source generally visits an alternative office site (geographical location 304) for a week and stays at a hotel (geographical location 305) during the visit. - During the first two weeks of August, the activity source visits another new
geographical location 307. It may be determined thatgeographical location 307 is a place the activity source visits during vacation time, such as a beach resort or a city in a different country. Similarly, during the last week of December, the activity source also visits a newgeographical location 308, which may be a ski resort or a home of a friend of family whom the activity source visits during the holiday season. - Again, the yearly profile may be used to predict future behaviors for the activity source on a yearly basis. Information relating to the activity source's yearly activities may be provided to the activity source at appropriate times. For example, when it gets close to the time when the activity source is expected to take a vacation, tourism related information, such as resorts, possible destinations, flights, hotels, services, etc. may be provided to the activity source. When it gets close to the holiday seasons, information on merchandise as possible gift ideas as well as travel information may be provided to the activity source.
- Again, if desirable, multiple yearly profiles, similar to that shown in
FIG. 6 , may be constructed for an activity source. - The method described above in
FIG. 1 may be carried out, for example, in a programmed computing system.FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented. The various aspects of the invention may be practiced in a wide variety of network environments (represented by network 217) including, for example, TCP/IP-based networks, telecommunications networks, wireless networks, etc. In addition, the computer program instructions with which embodiments of the invention are implemented may be stored in any type of computer-readable media, and may be executed according to a variety of computing models including, for example, on a stand-alone computing device, or according to a distributed computing model in which various of the functionalities described herein may be effected or employed at different locations. The software program implementing various embodiments may be executed on the server 208. For example, websites may be hosted onvarious servers 708. Software programs designed to collect network activity information (e.g., activity source ID, IP address, timestamp) may be executed on theservers 708 as well. The collected information may be stored in one ormore databases 714 communicatively linked to theservers 708 - According to various embodiments, interaction with the
Internet 712 may be conducted using various devices, such asdesktop computers 703,notebook computers 702,mobile telephones 704,PDAs 705, etc. The devices may be connected to the Internet via cables and perhaps through arouter 709 or wirelessly. A web browser may be executed on the devices and used to view the web page, each web browser having a unique ID that may be used to identify the web browser (i.e., activity source). - While this invention has been described in terms of several preferred embodiments, there are alterations, permutations, and various substitute equivalents, which fall within the scope of this invention. It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, permutations, and various substitute equivalents as fall within the true spirit and scope of the present invention.
Claims (24)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/776,488 US7958228B2 (en) | 2007-07-11 | 2007-07-11 | Behavioral predictions based on network activity locations |
PCT/US2008/067902 WO2009009284A2 (en) | 2007-07-11 | 2008-06-23 | Behavioral predictions based on network activity locations |
TW097124691A TWI369617B (en) | 2007-07-11 | 2008-07-01 | Behavioral predictions based on network activity locations |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/776,488 US7958228B2 (en) | 2007-07-11 | 2007-07-11 | Behavioral predictions based on network activity locations |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090019182A1 true US20090019182A1 (en) | 2009-01-15 |
US7958228B2 US7958228B2 (en) | 2011-06-07 |
Family
ID=40229402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/776,488 Expired - Fee Related US7958228B2 (en) | 2007-07-11 | 2007-07-11 | Behavioral predictions based on network activity locations |
Country Status (3)
Country | Link |
---|---|
US (1) | US7958228B2 (en) |
TW (1) | TWI369617B (en) |
WO (1) | WO2009009284A2 (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100151816A1 (en) * | 2008-12-16 | 2010-06-17 | Jan Besehanic | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US20110016058A1 (en) * | 2009-07-14 | 2011-01-20 | Pinchuk Steven G | Method of predicting a plurality of behavioral events and method of displaying information |
US20140045596A1 (en) * | 2012-08-07 | 2014-02-13 | Lawrence Cameron Vaughan | Methods and systems for determining the location of online gaming clients |
US20140156841A1 (en) * | 2010-07-27 | 2014-06-05 | Aerohive Networks, Inc. | Client-independent network supervision application |
US20140237105A1 (en) * | 2013-02-15 | 2014-08-21 | Aude Hofleitner | Estimation of user location based upon access patterns |
US8954090B2 (en) | 2010-08-25 | 2015-02-10 | The Nielson Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US20160036646A1 (en) * | 2013-04-10 | 2016-02-04 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for determining area in which ip address is located |
WO2016051925A1 (en) * | 2014-09-29 | 2016-04-07 | シャープ株式会社 | Weekday/holiday determining device, weekday/holiday determining method, and program |
US9449279B2 (en) | 2010-06-24 | 2016-09-20 | The Nielsen Company (Us), Llc | Network server arrangements for processing non-parametric, multi-dimensional, spatial and temporal human behavior or technical observations measured pervasively, and related methods for the same |
US9479540B2 (en) | 2013-12-13 | 2016-10-25 | Aerohive Networks, Inc. | User-based network onboarding |
US9633190B2 (en) | 2008-04-01 | 2017-04-25 | Nudata Security Inc. | Systems and methods for assessing security risk |
US9648034B2 (en) | 2015-09-05 | 2017-05-09 | Nudata Security Inc. | Systems and methods for detecting and scoring anomalies |
US9690676B2 (en) | 2013-03-15 | 2017-06-27 | Aerohive Networks, Inc. | Assigning network device subnets to perform network activities using network device information |
US9842204B2 (en) | 2008-04-01 | 2017-12-12 | Nudata Security Inc. | Systems and methods for assessing security risk |
US9948626B2 (en) | 2013-03-15 | 2018-04-17 | Aerohive Networks, Inc. | Split authentication network systems and methods |
US9990487B1 (en) | 2017-05-05 | 2018-06-05 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US10007776B1 (en) | 2017-05-05 | 2018-06-26 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US10127373B1 (en) | 2017-05-05 | 2018-11-13 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US20190066126A1 (en) * | 2008-05-27 | 2019-02-28 | Qualcomm Incorporated | Methods and apparatus for generating user profile based on periodic location fixes |
TWI681306B (en) * | 2017-10-10 | 2020-01-01 | 英華達股份有限公司 | Method, system and storage media for group notification based on user behavior |
US10860984B1 (en) | 2019-06-18 | 2020-12-08 | Microsoft Technology Licensing, Llc | Out of office email detection system |
US20220239674A1 (en) * | 2016-11-28 | 2022-07-28 | Palo Alto Networks, Inc. | Security appliance to monitor networked computing environment |
US11502914B2 (en) | 2009-05-08 | 2022-11-15 | The Nielsen Company (Us), Llc | Systems and methods for behavioural and contextual data analytics |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7809805B2 (en) | 2007-02-28 | 2010-10-05 | Facebook, Inc. | Systems and methods for automatically locating web-based social network members |
US8375052B2 (en) * | 2007-10-03 | 2013-02-12 | Microsoft Corporation | Outgoing message monitor |
US8990106B2 (en) * | 2008-08-22 | 2015-03-24 | Realwire Limited | Information categorisation systems, modules, and methods |
US9119027B2 (en) * | 2009-10-06 | 2015-08-25 | Facebook, Inc. | Sharing of location-based content item in social networking service |
US8452779B1 (en) | 2010-07-09 | 2013-05-28 | Collective Labs, Llc | Methods and system for targeted content delivery |
US8412665B2 (en) | 2010-11-17 | 2013-04-02 | Microsoft Corporation | Action prediction and identification temporal user behavior |
US10304066B2 (en) | 2010-12-22 | 2019-05-28 | Facebook, Inc. | Providing relevant notifications for a user based on location and social information |
US8838581B2 (en) * | 2011-08-19 | 2014-09-16 | Facebook, Inc. | Sending notifications about other users with whom a user is likely to interact |
US20130297536A1 (en) | 2012-05-01 | 2013-11-07 | Bernie Almosni | Mental health digital behavior monitoring support system and method |
US9641544B1 (en) * | 2015-09-18 | 2017-05-02 | Palo Alto Networks, Inc. | Automated insider threat prevention |
US10855656B2 (en) | 2017-09-15 | 2020-12-01 | Palo Alto Networks, Inc. | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation |
US10931637B2 (en) | 2017-09-15 | 2021-02-23 | Palo Alto Networks, Inc. | Outbound/inbound lateral traffic punting based on process risk |
US11127014B2 (en) | 2017-12-11 | 2021-09-21 | Mastercard International Incorporated | Systems and methods for analyzing sleep data and sleep pattern data |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5835087A (en) * | 1994-11-29 | 1998-11-10 | Herz; Frederick S. M. | System for generation of object profiles for a system for customized electronic identification of desirable objects |
US20010013123A1 (en) * | 1991-11-25 | 2001-08-09 | Freeman Michael J. | Customized program creation by splicing server based video, audio, or graphical segments |
US20010036224A1 (en) * | 2000-02-07 | 2001-11-01 | Aaron Demello | System and method for the delivery of targeted data over wireless networks |
US20020016786A1 (en) * | 1999-05-05 | 2002-02-07 | Pitkow James B. | System and method for searching and recommending objects from a categorically organized information repository |
US20020073419A1 (en) * | 2000-11-28 | 2002-06-13 | Navic Systems, Incorporated | Using viewership Profiles for targeted promotion deployment |
US20020111172A1 (en) * | 2001-02-14 | 2002-08-15 | Dewolf Frederik M. | Location based profiling |
US20020184080A1 (en) * | 1999-04-20 | 2002-12-05 | Uzi Murad | Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud |
US20020188507A1 (en) * | 2001-06-12 | 2002-12-12 | International Business Machines Corporation | Method and system for predicting customer behavior based on data network geography |
US20030083938A1 (en) * | 2001-10-29 | 2003-05-01 | Ncr Corporation | System and method for profiling different users having a common computer identifier |
US20030195694A1 (en) * | 2001-06-06 | 2003-10-16 | Frank Kozak | Driving profile method and system |
US6654735B1 (en) * | 1999-01-08 | 2003-11-25 | International Business Machines Corporation | Outbound information analysis for generating user interest profiles and improving user productivity |
US20040068582A1 (en) * | 2000-04-03 | 2004-04-08 | Mark Anderson | Method and system to initiate geolocation activities on demand and responsive to receipt of a query |
US20050197954A1 (en) * | 2003-08-22 | 2005-09-08 | Jill Maitland | Methods and systems for predicting business behavior from profiling consumer card transactions |
US20060212601A1 (en) * | 2001-03-19 | 2006-09-21 | Microsoft Corporation | Method and system to determine the geographic location of a network user |
US20070021973A1 (en) * | 2005-07-25 | 2007-01-25 | Newdea, Inc. | Automated community to exchange philanthropy information |
US20070206741A1 (en) * | 2006-03-01 | 2007-09-06 | Sbc Knowledge Ventures Lp | Method and apparatus for monitoring network activity |
US20070250628A1 (en) * | 2004-11-26 | 2007-10-25 | Fujitsu Limited | Network/service control method |
US20080015878A1 (en) * | 2006-07-17 | 2008-01-17 | Yahoo! Inc. | Real-time user profile platform for targeted online advertisement and personalization |
US20080086473A1 (en) * | 2006-10-06 | 2008-04-10 | Prodigen, Llc | Computerized management of grouping access rights |
US20080133311A1 (en) * | 2006-12-01 | 2008-06-05 | Rodrigo Dario Madriz Ottolina | System and method for managing content consumption using a content licensing platform |
US20080181179A1 (en) * | 2007-01-31 | 2008-07-31 | Jeyhan Karaoguz | Anticipatory hand-off setup between networks |
US20090132345A1 (en) * | 2004-02-13 | 2009-05-21 | Bahram Meyssami | Method and system for determining relevant matches based on attributes |
US20090150238A1 (en) * | 2005-10-12 | 2009-06-11 | Adam Marsh | System and method for the reversible leasing of anonymous user data in exchange for personalized content including targeted advertisements |
US7617160B1 (en) * | 2003-02-05 | 2009-11-10 | Michael I. Grove | Choice-based relationship system (CRS) |
US20100151817A1 (en) * | 2007-02-26 | 2010-06-17 | Lidstroem Mattias | Method And Apparatus For Monitoring Client Behaviour |
-
2007
- 2007-07-11 US US11/776,488 patent/US7958228B2/en not_active Expired - Fee Related
-
2008
- 2008-06-23 WO PCT/US2008/067902 patent/WO2009009284A2/en active Application Filing
- 2008-07-01 TW TW097124691A patent/TWI369617B/en not_active IP Right Cessation
Patent Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010013123A1 (en) * | 1991-11-25 | 2001-08-09 | Freeman Michael J. | Customized program creation by splicing server based video, audio, or graphical segments |
US5835087A (en) * | 1994-11-29 | 1998-11-10 | Herz; Frederick S. M. | System for generation of object profiles for a system for customized electronic identification of desirable objects |
US6654735B1 (en) * | 1999-01-08 | 2003-11-25 | International Business Machines Corporation | Outbound information analysis for generating user interest profiles and improving user productivity |
US20020184080A1 (en) * | 1999-04-20 | 2002-12-05 | Uzi Murad | Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud |
US20020016786A1 (en) * | 1999-05-05 | 2002-02-07 | Pitkow James B. | System and method for searching and recommending objects from a categorically organized information repository |
US7031961B2 (en) * | 1999-05-05 | 2006-04-18 | Google, Inc. | System and method for searching and recommending objects from a categorically organized information repository |
US20010036224A1 (en) * | 2000-02-07 | 2001-11-01 | Aaron Demello | System and method for the delivery of targeted data over wireless networks |
US20040068582A1 (en) * | 2000-04-03 | 2004-04-08 | Mark Anderson | Method and system to initiate geolocation activities on demand and responsive to receipt of a query |
US20020073419A1 (en) * | 2000-11-28 | 2002-06-13 | Navic Systems, Incorporated | Using viewership Profiles for targeted promotion deployment |
US20020111172A1 (en) * | 2001-02-14 | 2002-08-15 | Dewolf Frederik M. | Location based profiling |
US20060212601A1 (en) * | 2001-03-19 | 2006-09-21 | Microsoft Corporation | Method and system to determine the geographic location of a network user |
US20030195694A1 (en) * | 2001-06-06 | 2003-10-16 | Frank Kozak | Driving profile method and system |
US20020188507A1 (en) * | 2001-06-12 | 2002-12-12 | International Business Machines Corporation | Method and system for predicting customer behavior based on data network geography |
US20030083938A1 (en) * | 2001-10-29 | 2003-05-01 | Ncr Corporation | System and method for profiling different users having a common computer identifier |
US7617160B1 (en) * | 2003-02-05 | 2009-11-10 | Michael I. Grove | Choice-based relationship system (CRS) |
US20050197954A1 (en) * | 2003-08-22 | 2005-09-08 | Jill Maitland | Methods and systems for predicting business behavior from profiling consumer card transactions |
US7853469B2 (en) * | 2003-08-22 | 2010-12-14 | Mastercard International | Methods and systems for predicting business behavior from profiling consumer card transactions |
US20090132345A1 (en) * | 2004-02-13 | 2009-05-21 | Bahram Meyssami | Method and system for determining relevant matches based on attributes |
US20070250628A1 (en) * | 2004-11-26 | 2007-10-25 | Fujitsu Limited | Network/service control method |
US20070021973A1 (en) * | 2005-07-25 | 2007-01-25 | Newdea, Inc. | Automated community to exchange philanthropy information |
US20090150238A1 (en) * | 2005-10-12 | 2009-06-11 | Adam Marsh | System and method for the reversible leasing of anonymous user data in exchange for personalized content including targeted advertisements |
US20070206741A1 (en) * | 2006-03-01 | 2007-09-06 | Sbc Knowledge Ventures Lp | Method and apparatus for monitoring network activity |
US20080015878A1 (en) * | 2006-07-17 | 2008-01-17 | Yahoo! Inc. | Real-time user profile platform for targeted online advertisement and personalization |
US20080086473A1 (en) * | 2006-10-06 | 2008-04-10 | Prodigen, Llc | Computerized management of grouping access rights |
US20080133311A1 (en) * | 2006-12-01 | 2008-06-05 | Rodrigo Dario Madriz Ottolina | System and method for managing content consumption using a content licensing platform |
US20080181179A1 (en) * | 2007-01-31 | 2008-07-31 | Jeyhan Karaoguz | Anticipatory hand-off setup between networks |
US20100151817A1 (en) * | 2007-02-26 | 2010-06-17 | Lidstroem Mattias | Method And Apparatus For Monitoring Client Behaviour |
Cited By (72)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10997284B2 (en) | 2008-04-01 | 2021-05-04 | Mastercard Technologies Canada ULC | Systems and methods for assessing security risk |
US9842204B2 (en) | 2008-04-01 | 2017-12-12 | Nudata Security Inc. | Systems and methods for assessing security risk |
US11036847B2 (en) | 2008-04-01 | 2021-06-15 | Mastercard Technologies Canada ULC | Systems and methods for assessing security risk |
US9946864B2 (en) | 2008-04-01 | 2018-04-17 | Nudata Security Inc. | Systems and methods for implementing and tracking identification tests |
US10839065B2 (en) | 2008-04-01 | 2020-11-17 | Mastercard Technologies Canada ULC | Systems and methods for assessing security risk |
US9633190B2 (en) | 2008-04-01 | 2017-04-25 | Nudata Security Inc. | Systems and methods for assessing security risk |
US20190066126A1 (en) * | 2008-05-27 | 2019-02-28 | Qualcomm Incorporated | Methods and apparatus for generating user profile based on periodic location fixes |
US11341511B2 (en) * | 2008-05-27 | 2022-05-24 | Qualcomm Incorporated | Methods and apparatus for generating user profile based on periodic location fixes |
US20220237631A1 (en) * | 2008-05-27 | 2022-07-28 | Qualcomm Incorporated | Methods and apparatus for generating user profile based on periodic location fixes |
US20140358640A1 (en) * | 2008-12-16 | 2014-12-04 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US10956923B2 (en) * | 2008-12-16 | 2021-03-23 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US20190095938A1 (en) * | 2008-12-16 | 2019-03-28 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US20230177546A1 (en) * | 2008-12-16 | 2023-06-08 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US10078846B2 (en) * | 2008-12-16 | 2018-09-18 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US11783356B2 (en) * | 2008-12-16 | 2023-10-10 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US11556946B2 (en) * | 2008-12-16 | 2023-01-17 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US20210295360A1 (en) * | 2008-12-16 | 2021-09-23 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US20100151816A1 (en) * | 2008-12-16 | 2010-06-17 | Jan Besehanic | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US8812012B2 (en) * | 2008-12-16 | 2014-08-19 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US10685365B2 (en) * | 2008-12-16 | 2020-06-16 | The Nielsen Company (Us), Llc | Methods and apparatus for associating media devices with a demographic composition of a geographic area |
US11502914B2 (en) | 2009-05-08 | 2022-11-15 | The Nielsen Company (Us), Llc | Systems and methods for behavioural and contextual data analytics |
US20110016058A1 (en) * | 2009-07-14 | 2011-01-20 | Pinchuk Steven G | Method of predicting a plurality of behavioral events and method of displaying information |
US9449279B2 (en) | 2010-06-24 | 2016-09-20 | The Nielsen Company (Us), Llc | Network server arrangements for processing non-parametric, multi-dimensional, spatial and temporal human behavior or technical observations measured pervasively, and related methods for the same |
US9699055B2 (en) * | 2010-07-27 | 2017-07-04 | Aerohive Networks, Inc. | Client-independent network supervision application |
US9282018B2 (en) * | 2010-07-27 | 2016-03-08 | Aerohive Networks, Inc. | Client-independent network supervision application |
US20140156841A1 (en) * | 2010-07-27 | 2014-06-05 | Aerohive Networks, Inc. | Client-independent network supervision application |
US11769174B2 (en) | 2010-08-25 | 2023-09-26 | The Nielsen Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US9613363B2 (en) | 2010-08-25 | 2017-04-04 | The Nielsen Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US10380643B2 (en) | 2010-08-25 | 2019-08-13 | The Nielsen Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US11170410B2 (en) | 2010-08-25 | 2021-11-09 | The Nielsen Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US8954090B2 (en) | 2010-08-25 | 2015-02-10 | The Nielson Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US10713687B2 (en) | 2010-08-25 | 2020-07-14 | The Nielsen Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US9996855B2 (en) | 2010-08-25 | 2018-06-12 | The Nielsen Company (Us), Llc | Methods, systems and apparatus to generate market segmentation data with anonymous location data |
US20140045596A1 (en) * | 2012-08-07 | 2014-02-13 | Lawrence Cameron Vaughan | Methods and systems for determining the location of online gaming clients |
US9787781B2 (en) * | 2013-02-15 | 2017-10-10 | Facebook, Inc. | Estimation of user location based upon access patterns |
US20140237105A1 (en) * | 2013-02-15 | 2014-08-21 | Aude Hofleitner | Estimation of user location based upon access patterns |
US9690676B2 (en) | 2013-03-15 | 2017-06-27 | Aerohive Networks, Inc. | Assigning network device subnets to perform network activities using network device information |
US10810095B2 (en) | 2013-03-15 | 2020-10-20 | Extreme Networks, Inc. | Assigning network device subnets to perform network activities using network device information |
US10924465B2 (en) | 2013-03-15 | 2021-02-16 | Extreme Networks, Inc. | Split authentication network systems and methods |
US9965366B2 (en) | 2013-03-15 | 2018-05-08 | Aerohive Networks, Inc. | Assigning network device subnets to perform network activities using network device information |
US10397211B2 (en) | 2013-03-15 | 2019-08-27 | Aerohive Networks, Inc. | Split authentication network systems and methods |
US9948626B2 (en) | 2013-03-15 | 2018-04-17 | Aerohive Networks, Inc. | Split authentication network systems and methods |
US10097420B2 (en) * | 2013-04-10 | 2018-10-09 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for determining area in which IP address is located |
US20160036646A1 (en) * | 2013-04-10 | 2016-02-04 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for determining area in which ip address is located |
US10003615B2 (en) | 2013-12-13 | 2018-06-19 | Aerohive Networks, Inc. | User-based network onboarding |
US10320847B2 (en) | 2013-12-13 | 2019-06-11 | Aerohive Networks, Inc. | User-based network onboarding |
US9479540B2 (en) | 2013-12-13 | 2016-10-25 | Aerohive Networks, Inc. | User-based network onboarding |
US9686319B2 (en) | 2013-12-13 | 2017-06-20 | Aerohive Networks, Inc. | User-based network onboarding |
WO2016051925A1 (en) * | 2014-09-29 | 2016-04-07 | シャープ株式会社 | Weekday/holiday determining device, weekday/holiday determining method, and program |
JPWO2016051925A1 (en) * | 2014-09-29 | 2017-04-27 | シャープ株式会社 | Weekday holiday determination device, weekday holiday determination method, and program |
US9813446B2 (en) * | 2015-09-05 | 2017-11-07 | Nudata Security Inc. | Systems and methods for matching and scoring sameness |
US9749356B2 (en) | 2015-09-05 | 2017-08-29 | Nudata Security Inc. | Systems and methods for detecting and scoring anomalies |
US10749884B2 (en) | 2015-09-05 | 2020-08-18 | Mastercard Technologies Canada ULC | Systems and methods for detecting and preventing spoofing |
CN108885659A (en) * | 2015-09-05 | 2018-11-23 | 万事达卡技术加拿大无限责任公司 | System and method for matching and scoring identity |
US10129279B2 (en) | 2015-09-05 | 2018-11-13 | Mastercard Technologies Canada ULC | Systems and methods for detecting and preventing spoofing |
US9979747B2 (en) | 2015-09-05 | 2018-05-22 | Mastercard Technologies Canada ULC | Systems and methods for detecting and preventing spoofing |
AU2019271891B2 (en) * | 2015-09-05 | 2021-02-18 | Mastercard Technologies Canada ULC | Systems and methods for matching and scoring sameness |
US10212180B2 (en) | 2015-09-05 | 2019-02-19 | Mastercard Technologies Canada ULC | Systems and methods for detecting and preventing spoofing |
US10965695B2 (en) | 2015-09-05 | 2021-03-30 | Mastercard Technologies Canada ULC | Systems and methods for matching and scoring sameness |
US9800601B2 (en) | 2015-09-05 | 2017-10-24 | Nudata Security Inc. | Systems and methods for detecting and scoring anomalies |
US9749357B2 (en) * | 2015-09-05 | 2017-08-29 | Nudata Security Inc. | Systems and methods for matching and scoring sameness |
US10805328B2 (en) | 2015-09-05 | 2020-10-13 | Mastercard Technologies Canada ULC | Systems and methods for detecting and scoring anomalies |
US9749358B2 (en) | 2015-09-05 | 2017-08-29 | Nudata Security Inc. | Systems and methods for matching and scoring sameness |
US9648034B2 (en) | 2015-09-05 | 2017-05-09 | Nudata Security Inc. | Systems and methods for detecting and scoring anomalies |
US9680868B2 (en) | 2015-09-05 | 2017-06-13 | Nudata Security Inc. | Systems and methods for matching and scoring sameness |
US20220239674A1 (en) * | 2016-11-28 | 2022-07-28 | Palo Alto Networks, Inc. | Security appliance to monitor networked computing environment |
US11818144B2 (en) * | 2016-11-28 | 2023-11-14 | Palo Alto Networks, Inc. | Security appliance to monitor networked computing environment |
US10007776B1 (en) | 2017-05-05 | 2018-06-26 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US10127373B1 (en) | 2017-05-05 | 2018-11-13 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
US9990487B1 (en) | 2017-05-05 | 2018-06-05 | Mastercard Technologies Canada ULC | Systems and methods for distinguishing among human users and software robots |
TWI681306B (en) * | 2017-10-10 | 2020-01-01 | 英華達股份有限公司 | Method, system and storage media for group notification based on user behavior |
US10860984B1 (en) | 2019-06-18 | 2020-12-08 | Microsoft Technology Licensing, Llc | Out of office email detection system |
Also Published As
Publication number | Publication date |
---|---|
US7958228B2 (en) | 2011-06-07 |
WO2009009284A2 (en) | 2009-01-15 |
TW200915110A (en) | 2009-04-01 |
WO2009009284A3 (en) | 2009-04-02 |
TWI369617B (en) | 2012-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7958228B2 (en) | Behavioral predictions based on network activity locations | |
US12093339B1 (en) | Methods and systems for providing a document | |
US20190158609A1 (en) | System and method for improved mapping and routing | |
US10558724B2 (en) | Location graph based derivation of attributes | |
US10304086B2 (en) | Techniques for estimating demographic information | |
JP5771534B2 (en) | System and method for delivering sponsored landmarks and location labels | |
JP4866463B2 (en) | System and method for dynamically providing news distribution for users of social networks | |
US10304065B2 (en) | Determining advertising conversion | |
US20170180505A1 (en) | Method, computer-readable storage device and apparatus for storing privacy information | |
US20160027055A1 (en) | Combining attributes from multiple sources | |
US20100198869A1 (en) | System and method for communal search | |
US11961097B2 (en) | Determining advertising conversion | |
JP2014510972A (en) | Determining preference categories based on user access attribute values | |
CN101802856A (en) | Measuring a location based advertising campaign | |
JP6693896B2 (en) | Information processing apparatus, information processing method, and information processing program | |
JP2008181334A (en) | Advertisement distribution order determination method, advertisement distribution system, advertisement distribution order determination device and computer program | |
US20130117127A1 (en) | Contextual ad stories | |
US20130006727A1 (en) | Systems and methods for social filtering of geobookmarks | |
US11575762B2 (en) | Subscription-based message selection and transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: YAHOO! INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RIISE, SOREN;PATEL, DEVESH;PAI, RAMESH G.;AND OTHERS;SIGNING DATES FROM 20070705 TO 20070710;REEL/FRAME:019544/0887 Owner name: YAHOO! INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RIISE, SOREN;PATEL, DEVESH;PAI, RAMESH G.;AND OTHERS;REEL/FRAME:019544/0887;SIGNING DATES FROM 20070705 TO 20070710 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: EXCALIBUR IP, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO! INC.;REEL/FRAME:038383/0466 Effective date: 20160418 |
|
AS | Assignment |
Owner name: YAHOO! INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXCALIBUR IP, LLC;REEL/FRAME:038951/0295 Effective date: 20160531 |
|
AS | Assignment |
Owner name: EXCALIBUR IP, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO! INC.;REEL/FRAME:038950/0592 Effective date: 20160531 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:ACACIA RESEARCH GROUP LLC;AMERICAN VEHICULAR SCIENCES LLC;BONUTTI SKELETAL INNOVATIONS LLC;AND OTHERS;REEL/FRAME:052853/0153 Effective date: 20200604 |
|
AS | Assignment |
Owner name: R2 SOLUTIONS LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXCALIBUR IP, LLC;REEL/FRAME:053459/0059 Effective date: 20200428 |
|
AS | Assignment |
Owner name: BONUTTI SKELETAL INNOVATIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: R2 SOLUTIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: LIFEPORT SCIENCES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: TELECONFERENCE SYSTEMS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: STINGRAY IP SOLUTIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: INNOVATIVE DISPLAY TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: LIMESTONE MEMORY SYSTEMS LLC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: UNIFICATION TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: CELLULAR COMMUNICATIONS EQUIPMENT LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: SAINT LAWRENCE COMMUNICATIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: ACACIA RESEARCH GROUP LLC, NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: MONARCH NETWORKING SOLUTIONS LLC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: MOBILE ENHANCEMENT SOLUTIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: SUPER INTERCONNECT TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: NEXUS DISPLAY TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: AMERICAN VEHICULAR SCIENCES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: PARTHENON UNIFIED MEMORY ARCHITECTURE LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 |
|
AS | Assignment |
Owner name: R2 SOLUTIONS LLC, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED ON REEL 053654 FRAME 0254. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST GRANTED PURSUANT TO THE PATENT SECURITY AGREEMENT PREVIOUSLY RECORDED;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:054981/0377 Effective date: 20200630 |
|
AS | Assignment |
Owner name: STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE ASSIGNOR NAME PREVIOUSLY RECORDED AT REEL: 052853 FRAME: 0153. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:R2 SOLUTIONS LLC;REEL/FRAME:056832/0001 Effective date: 20200604 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230607 |